Page 1 / 2   >   >>
WanaCrypt0r Hits Worldwide
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
Consumers and businesses should be sure their Windows systems and software are updated with all current patches in order to stop the spread of this dangerous ransomware attack.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 5/13/2017
Comment1 Comment  |  Read  |  Post a Comment
Malspam Causing Havoc for Mac & Windows
Malwarebytes Labs, Malwarebytes LabsCommentary
Spam is a multi-platform, multi-vector approach to network compromise, and organizations need to weigh up the risks on all fronts to be able to combat it successfully.
By Malwarebytes Labs Malwarebytes Labs, 5/9/2017
Comment0 comments  |  Read  |  Post a Comment
OSX.Bella: Mac Malware Strikes Again
Thomas Reed, Director of Mac Offerings, MalwarebytesCommentary
This variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.
By Thomas Reed Director of Mac Offerings, Malwarebytes, 5/2/2017
Comment1 Comment  |  Read  |  Post a Comment
Locky Returns with a New (Borrowed) Distribution Method
Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes, Commentary
A layered defense is a strong security posture for dealing with a threat like Locky, that can come in different disguises.
By Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes , 4/26/2017
Comment0 comments  |  Read  |  Post a Comment
Cybercrime Tactics & Techniques: Q1 2017
Malwarebytes Labs, Malwarebytes LabsCommentary
A deep dive into the threats that got our attention during the first three months of the year and what to expect going forward.
By Malwarebytes Labs Malwarebytes Labs, 4/18/2017
Comment0 comments  |  Read  |  Post a Comment
Securing your Privacy on Android
Nathan Collier, Senior Malware Intelligence Analyst, MalwarebytesCommentary
If you work at a company that allows you to use your mobile device to login to email, access company data, or connect to company Wi-Fi, youre more of a security risk than you think.
By Nathan Collier Senior Malware Intelligence Analyst, Malwarebytes, 4/12/2017
Comment0 comments  |  Read  |  Post a Comment
OSX.Dok: New & Sophisticated Mac Malware Strikes
Thomas Reed, Director of Mac Offerings, MalwarebytesCommentary
Phishing-deployed malware can capture account credentials for any website users log into.
By Thomas Reed Director of Mac Offerings, Malwarebytes, 4/7/2017
Comment0 comments  |  Read  |  Post a Comment
Top 5 Dumbest Cyber Threats That Still Pay Off
Malwarebytes Labs, Malwarebytes LabsCommentary
Some hackers are fairly predictable in their successful use of really dumb attacks.
By Malwarebytes Labs Malwarebytes Labs, 4/4/2017
Comment1 Comment  |  Read  |  Post a Comment
Exploit Kits: Winter 2017 Review
Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes, Commentary
We take another look at the current EK scene by going over RIG, Sundown, Neutrino and Magnitude.
By Jerome Segura, Lead Malware Intelligence Analyst, Malwarebytes , 3/28/2017
Comment0 comments  |  Read  |  Post a Comment
Malware Explained: Packer, Crypter & Protector
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
These three techniques can protect malware from analysis. Heres how they work.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/22/2017
Comment0 comments  |  Read  |  Post a Comment
7 Things You Need to Know about Bayesian Spam Filtering
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
Knowing how spam filters work can clarify how some messages get through, and how your own emails can avoid being caught.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/14/2017
Comment0 comments  |  Read  |  Post a Comment
4 Ways to Recover from a Cyberattack
Malwarebytes Labs, Malwarebytes LabsCommentary
Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.
By Malwarebytes Labs Malwarebytes Labs, 3/8/2017
Comment0 comments  |  Read  |  Post a Comment
Adware vs. Ad Fraud: Viva la Difference!
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
Both earn their money in the advertising trade but they each have very different means of operation and targets.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/6/2017
Comment0 comments  |  Read  |  Post a Comment
DNSSEC: Why Do We Need It?
Pieter Arntz, Malware Intelligence Researcher, MalwarebytesCommentary
The number of signed domain names has grown considerably over the past two and a half years but some sectors are heavily lagging behind.
By Pieter Arntz Malware Intelligence Researcher, Malwarebytes, 3/1/2017
Comment1 Comment  |  Read  |  Post a Comment
Mac Malware Reaches New Highs
Thomas Reed, Director of Mac Offerings, MalwarebytesCommentary
Two new malware threats in a week this past month, plus others in January, brings the 2017 Mac malware count up to 6 and growing.
By Thomas Reed Director of Mac Offerings, Malwarebytes, 2/28/2017
Comment1 Comment  |  Read  |  Post a Comment
Meet 'Fruitfly:' Mac Malware Targeting Biomedical Research Centers
Malwarebytes Labs, Malwarebytes LabsCommentary
This newly discovered code contains indications that it has been circulating undetected for at least a couple years.
By Malwarebytes Labs Malwarebytes Labs, 1/24/2017
Comment0 comments  |  Read  |  Post a Comment
Threat Attribution: Misunderstood & Abused
Malwarebytes Labs, Malwarebytes LabsCommentary
Despite its many pitfalls, threat attribution remains an important part of any incident response plan. Heres why.
By Malwarebytes Labs Malwarebytes Labs, 1/18/2017
Comment0 comments  |  Read  |  Post a Comment
Understanding The Basics Of Two-Factor Authentication
Malwarebytes Labs, Malwarebytes LabsCommentary
With data breaches resulting in leaked passwords occurring almost daily, two-factor authentication has become an essential tool in the security toolkit.
By Malwarebytes Labs Malwarebytes Labs, 1/16/2017
Comment2 comments  |  Read  |  Post a Comment
Operational Security Best Practices For Social Media
Malwarebytes Labs, Malwarebytes LabsCommentary
Building a firm, clear policy on disclosures online can provide a flexible, adaptive response that will protect proprietary data from winding up in a public leak.
By Malwarebytes Labs Malwarebytes Labs, 1/11/2017
Comment0 comments  |  Read  |  Post a Comment
Online Or Offline, Ransomware Will Find You
Malwarebytes Labs, Malwarebytes LabsCommentary
The current threat landscape is a mish-mash of online ransomware, offline ransomware, and those that are a mixture of the two.
By Malwarebytes Labs Malwarebytes Labs, 1/9/2017
Comment0 comments  |  Read  |  Post a Comment
Page 1 / 2   >   >>
1268
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
7 Free (or Cheap) Ways to Increase Your Cybersecurity Knowledge
Curtis Franklin Jr., Senior Editor at Dark Reading,  11/15/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the companys flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit us at www.malwarebytes.com/business.
Featured Writers
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19327
PUBLISHED: 2018-11-17
An issue was discovered in JTBC(PHP) 3.0.1.7. aboutus/manage.php?type=action&action=add allows CSRF.
CVE-2018-19328
PUBLISHED: 2018-11-17
LAOBANCMS 2.0 allows install/mysql_hy.php?riqi=../ Directory Traversal.
CVE-2018-19329
PUBLISHED: 2018-11-17
GreenCMS v2.3.0603 allows remote authenticated administrators to delete arbitrary files by modifying a base64-encoded pathname in an m=admin&c=media&a=delfilehandle&id= call, related to the m=admin&c=media&a=restorefile delete button.
CVE-2018-19331
PUBLISHED: 2018-11-17
An issue was discovered in S-CMS v1.5. There is a SQL injection vulnerability in search.php via the keyword parameter.
CVE-2018-19332
PUBLISHED: 2018-11-17
An issue was discovered in S-CMS v1.5. There is a CSRF vulnerability that can add a new user via the admin/ajax.php?type=member&action=add URI.